A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the
following would be the BEST choice to accomplish this task?
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following
programming concepts does jump represent?
Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?
A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?
A technician is installing a new wireless network and wants to secure the wireless network to prevent
unauthorized access. Which of the following protocols would be the MOST secure?
Which of the following is a value that uniquely identifies a database record?
Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
To establish a theory of probable cause, one technician investigates network issues in the server room while
another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies
is being performed?
A user logs into a laptop using a username and complex password. This is an example of:
Which of the following data types should a developer use when creating a variable to hold a postal code?
Which of the following BEST describes the physical location of the data in the database?
Which of the following WiFi security options would create the MOST need for a VPN connection on the client
device?
Given the following pseudocode:
Which of the following would be the output of the program?
Consider the following statements:
Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?
Which of the following types of memory can retain its content after a system reboot?
Which of the following would be the most cost-effective method to increase availability?
A user browses to a website. Before the page opens, the user receives a message that the site is not secure. Which of the following caused this message?
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?
A new device has been installed on a wired network and can be accessed via the LAN but cannot be accessed remotely.
Which of the following is the most likely cause?
A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?
Which of the following scripting languages is most likely to be used in a Linux command-line environment?
Which of the following data types should a database administrator use to store customer postal codes?
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the
following types of software would BEST complete this task?
A database administrator finds that a table is not needed in a relational database. Which of the following
commands is used to completely remove the table and its data?
Which of the following would be best to use to store a project task list that will be updated by multiple team members?
A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?
An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?
A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during
a MITM attack. Which of the following should the technician enable to reduce the risk?
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
A game developer is purchasing a computing device to develop a game and recognizes the game engine
software will require a device with high-end specifications that can be upgraded. Which of the following
devices would be BEST for the developer to buy?
A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?
A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?
Which of the following are benefits of a security awareness training program9 (Select two).
A global variable called “age” will be created in a program and incremented through the use of a function.
Which of the following data types should be defined with the age variable?
A company desires to implement a six-month survey site within a remote location. Which of the following is the
BEST option for Internet service?
For which of the following is a relational database management system MOST commonly used?
Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?
Which of the following are the primary functions of an operating system? (Choose two.)
Which of the following language types most likely controls the way a web page looks?
Which of the following best practices can be used to mitigate password reuse?
A large payment website was breached recently. A user is concerned that the breach will affect account
security on other sites. Which of the following password best practices would mitigate this risk?
Which of the following BEST describes the practice of providing user credentials when logging onto the
network?
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?
A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?
A programmer is generating results by iterating rows that provide values needed for one calculation. Which of the following functions best accomplishes this task?
Which of the following is most appropriate to list on a social media site about an employer?
Which of the following would be used to send messages using the SMTP protocol?
A company wants its employee to use an email client that downloads and removes messages from the email
server. Which of the following protocols must be configured in the email client to facilitate this?
Which of the following is the BEST option for a developer to use when storing the months of a year and when
performance is a key consideration?
Employee information is stored in a database. Which of the following BEST describes where all of an
employee’s information is stored?
A database administrator needs to add a column to an existing table. Which of the following statements should the administrator use?
A technician is having trouble connecting multiple users' laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?